CVE-2021-3504
Published: 11 May 2021
A flaw was found in the hivex library in versions before 1.3.20. It is caused due to a lack of bounds check within the hivex_open function. An attacker could input a specially crafted Windows Registry (hive) file which would cause hivex to read memory beyond its normal bounds or cause the program to crash. The highest threat from this vulnerability is to system availability.
Priority
Status
Package | Release | Status |
---|---|---|
hivex Launchpad, Ubuntu, Debian |
bionic |
Released
(1.3.15-1ubuntu0.1)
|
focal |
Released
(1.3.18-2ubuntu0.1)
|
|
groovy |
Ignored
(end of life)
|
|
hirsute |
Released
(1.3.19-1ubuntu3.21.04.1)
|
|
impish |
Released
(1.3.19-1ubuntu3.21.10.1)
|
|
jammy |
Needed
|
|
kinetic |
Ignored
(end of life, was needed)
|
|
lunar |
Ignored
(end of life, was needed)
|
|
mantic |
Needed
|
|
trusty |
Released
(1.3.9-2ubuntu0.1~esm1)
Available with Ubuntu Pro or Ubuntu Pro (Infra-only) |
|
upstream |
Ignored
(end of standard support)
|
|
xenial |
Does not exist
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 5.4 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | Required |
Scope | Unchanged |
Confidentiality | Low |
Integrity impact | None |
Availability impact | Low |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L |
References
- https://listman.redhat.com/archives/libguestfs/2021-May/msg00013.html
- https://github.com/libguestfs/hivex/commit/8f1935733b10d974a1a4176d38dd151ed98cf381
- https://ubuntu.com/security/notices/USN-5148-1
- https://ubuntu.com/security/notices/USN-5148-2
- https://www.cve.org/CVERecord?id=CVE-2021-3504
- NVD
- Launchpad
- Debian